taha aka "lordx64"Exclusive: I did a Q&A session with an AI powered Threat intelligence bot — here’s what you should…I am excited to do my first time ever a QA session with an Artificial Intelligence powered, Threat Intelligence Bot.5 min read·Nov 14, 2023----
taha aka "lordx64"Multiple Linux Backdoors Discovered Targeting Bitcoin Core Developer — Technical AnalysisAn in-depth technical analysis of various backdoors discovered in Luke’s compromised Linux server.8 min read·Jan 19, 2023--1--1
taha aka "lordx64"inConfiantL’art de l’évasion: How Shlayer hides its configuration inside Apple proprietary DMG filesIntro9 min read·Dec 24, 2022----
taha aka "lordx64"inConfiantHow SeaFlower 藏海花 installs backdoors in iOS/Android web3 wallets to steal your seed phraseDuring the course of our work at Confiant, we see malicious activity on a daily basis. What matters the most for us is the ability to:18 min read·Jun 12, 2022----
taha aka "lordx64"inConfiantProfiling hackers using the Malvertising Attack Matrix by ConfiantWhat is Malvertising?7 min read·Oct 18, 2021----
taha aka "lordx64"inConfiantOSX/Hydromac: A new macOS malware leaked from a Flashcards appAt @ConfiantIntel we had some “luck” finding a new malware targeting the new Apple flagship M1 computers. I put “luck” between quotes, as…10 min read·Jun 3, 2021----
taha aka "lordx64"Initial analysis of PasswordState supply chain attack backdoor codeOne hour ago, I became aware of this supply chain attack from tweet by Kim Zetter. If you don’t follow her please do and subscribe to her…7 min read·Apr 23, 2021----
taha aka "lordx64"How to extract Python source code from Py2App packed Mach-O BinariesI got many requests after my last tweet on the discovery of a backdoored Electrum wallet, that was notarized by Apple !4 min read·Mar 6, 2021----
taha aka "lordx64"inConfiantInternet Explorer CVE-2019–1367 Exploitation — part 3Shellcode Analysis9 min read·Jul 14, 2020--1--1
taha aka "lordx64"inConfiantInternet Explorer CVE-2019–1367 Exploitation — part 2In Part1 we explained CVE-2019–1367 vulnerability root cause. In this part we will discuss how this bug was exploited in the wild to…23 min read·Jul 13, 2020----